6 research outputs found

    Data bases and data base systems related to NASA's aerospace program. A bibliography with indexes

    Get PDF
    This bibliography lists 1778 reports, articles, and other documents introduced into the NASA scientific and technical information system, 1975 through 1980

    An examination of the Cosmos model for use in Department of Defense software development management

    Get PDF
    Currently, the proper management of DoD software development projects is lacking. This is due, in large pan, to the use of models of the software development process which neglect management aspects of the process. The Commonsense Management Model, "Cosmos", however, presents a complete view of this process by treating both its production and management facets. This model calls for a software development project manager to make three essential trade-offs. To make these essential trade-offs, a manager must consider the six principles of dealing with the dynamic complexity found in software development. Methods for dealing with these six principles can be found if the manager takes a three dimensional view of the software development process. Due to the conceptual nature of the Cosmos model, the model must first be grounded with "real world" examples before it can be effectively applied within DoD. To accomplish this, the Patriot software development management method is used to relate the concepts to specific examples for DoD use. By relating the concepts to examples, eight types of tools were found that could be used by future DoD software development projects to gain the benefit of a holistic view of the software development process presented by the Cosmos model. Specific recommendations are contained for inclusion in DoD policy with respect to software development management.http://archive.org/details/anexaminationofc1094531539NANAU.S. Army (USA) autho

    Energy. A continuing bibliography with indexes, issue 18

    Get PDF
    This issue of Energy lists 1038 reports, journal articles, and other documents announced between April 1, 1978 and June 30, 1978 in Scientific and Technical Aerospace Reports (STAR) or in International Aerospace Abstracts (IAA). The coverage includes regional, national and international energy systems; research and development on fuels and other sources of energy; energy conversion, transport, transmission, distribution and storage, with special emphasis on use of hydrogen and of solar energy. Also included are methods of locating or using new energy resources. Of special interest is energy for heating, lighting, for powering aircraft, surface vehicles, or other machinery

    Energy: A continuing bibliography with indexes, issue 20

    Get PDF
    A bibliography is presented which lists 1250 reports, articles, and other documents introduced into the NASA Scientific and Technical Information System from October 1, 1978 through December 31, 1978

    DDoS Capability and Readiness - Evidence from Australian Organisations

    Get PDF
    A common perception of cyber defence is that it should protect systems and data from malicious attacks, ideally keeping attackers outside of secure perimeters and preventing entry. Much of the effort in traditional cyber security defence is focused on removing gaps in security design and preventing those with legitimate permissions from becoming a gateway or resource for those seeking illegitimate access. By contrast, Distributed Denial of Service (DDoS) attacks do not use application backdoors or software vulnerabilities to create their impact. They instead utilise legitimate entry points and knowledge of system processes for illegitimate purposes. DDoS seeks to overwhelm system and infrastructure resources so that legitimate requests are prevented from reaching their intended destination. For this thesis, a literature review was performed using sources from two perspectives. Reviews of both industry literature and academic literature were combined to build a balanced view of knowledge of this area. Industry and academic literature revealed that DDoS is outpacing internet growth, with vandalism, criminal and ideological motivations rising to prominence. From a defence perspective, the human factor remains a weak link in cyber security due to proneness for mistakes, oversights and the variance in approach and methods expressed by differing cultures. How cyber security is perceived, approached, and applied can have a critical effect on the overall outcome achieved, even when similar technologies are implemented. In addition, variance in the technical capabilities of those responsible for the implementation may create further gaps and vulnerabilities. While discussing technical challenges and theoretical concepts, existing literature failed to cover the experiences held by the victim organisations, or the thoughts and feelings of their personnel. This thesis addresses these identified gaps through exploratory research, which used a mix of descriptive and qualitative analysis to develop results and conclusions. The websites of 60 Australian organisations were analysed to uncover the level and quality of cyber security information they were willing to share and the methods and processes they used to engage with their audience. In addition, semi-structured interviews were conducted with 30 employees from around half of those websites analysed. These were analysed using NVivo12 qualitative analysis software. The difficulty experienced with attracting willing participants reflected the comfort that organisations showed with sharing cyber security information and experiences. However, themes found within the results show that, while DDoS is considered a valid threat, without encouragement to collaborate and standardise minimum security levels, firms may be missing out on valuable strategies to improve their cyber security postures. Further, this reluctance to share leads organisations to rely on their own internal skill and expertise, thus failing to realise the benefits of established frameworks and increased diversity in the workforce. Along with the size of the participant pool, other limitations included the diversity of participants and the impact of COVID-19 which may have influenced participants' thoughts and reflections. These limitations however, present opportunity for future studies using greater participant numbers or a narrower target focus. Either option would be beneficial to the recommendations of this study which were made from a practical, social, theoretical and policy perspective. On a practical and social level, organisational capabilities suffer due to the lack of information sharing and this extends to the community when similar restrictions prevent collaboration. Sharing of knowledge and experiences while protecting sensitive information is a worthy goal and this is something that can lead to improved defence. However, while improved understanding is one way to reduce the impact of cyber-attacks, the introduction of minimum cyber security standards for products, could reduce the ease at which devices can be used to facilitate attacks, but only if policy and effective governance ensures product compliance with legislation. One positive side to COVID-19's push to remote working, was an increase in digital literacy. As more roles were temporarily removed from their traditional physical workplace, many employees needed to rapidly accelerate their digital competency to continue their employment. To assist this transition, organisations acted to implement technology solutions that eased the ability for these roles to be undertaken remotely and as a consequence, they opened up these roles to a greater pool of available candidates. Many of these roles are no longer limited to the geographical location of potential employees or traditional hours of availability. Many of these roles could be accessed from almost anywhere, at any time, which had a positive effect on organisational capability and digital sustainability

    Facing stigma, negotiating expectations, and exploring identities in a special olympics group transitioning into adulthood

    Get PDF
    Special Olympics continues to be controversial to those who criticize any segregated activity that is not inclusive for people with disabilities. Rather than dismissing the Special Olympics outright as an outdated organization that has not kept pace with the push towards inclusion, I engage these controversies from the perspectives of the disciplines of folklore and disability studies. I demonstrate that close attention to the actual practices and lived experiences of a Special Olympics group provides important insights about the challenges and goals of inclusive versus exclusive practices. I examine the athletes’ conceptions of identity, disability, and kinship to better understand how stigma affects people with intellectual and developmental disabilities (IDD) and the opportunities for full the participation in public life. Based on extensive ethnographic research, participant observation, and open-ended interviews with adult athletes, their families, coaches, and support professionals, I describe a Midwestern team’s activities, including athletic practices, games, home life, and social events. To what extent people with IDD are aware of stigma and its effects emerges as one of the underlying questions from this research. In addressing this, I encounter methodological challenges that require an appreciation for different communication styles, including deceptive practices, moments of resistance, and exercises of agency. I begin by looking at the history of the Special Olympics, how it is structured, and where it provides (or inhibits) possibilities for full participation. As part of that discussion, I describe the roles of safety, sportsmanship, and self-esteem. To further develop the issues that arise in discussing Special Olympics and inclusion from a disability studies perspective, I turn to the subjects of pity and its corollary, the celebration of individuals with IDD as mascots who are awarded symbolic, rather than actual, roles in sports, school, or community events. As mascots, individuals with IDD are hypervisible, but this does not necessarily counter the stigma they experience that prevents them from being fully included in other domains. In particular, obtaining and maintaining competitive employment are often the central measures of inclusion, so my concluding chapter considers the challenges faced by Special Olympics athletes in the workplace
    corecore